Security becomes a boardroom issue
Finding just the right provider can be tricky. How one company made its decision.
Vendors form Cyber Security Industry Alliance to coordinate Washington, boardroom approaches to security
Retaining data isn't enough. IT faces a host of regulations that address maintaining log files—tracking who did what and when—along with the requiring access to them in very short order.
Not knowing who’s accessing what is a recipe for auditing disasters
Interest is growing in a new British Standard—BS7799—that is slowly being adopted outside of Britain; companies adopting the standard may find they've implemented a best-practices security program.
Auditing can do more than just help you meet a host of new regulations. Last week we outlined several significant business benefits. This week we explore your options. (Second in a two-part series.)
Near-real-time monitoring may help your company catch attackers and restore altered data.
Auditing can do more than just help you meet a host of new government regulations. The author outlines the significant business benefits from a solid data-auditing program and explains the basic requirements of such a solution. (Part one of a two-part series.)
New legislation has failed to stem the tide of unsolicited e-mail, protecting e-mailers who follow the letter but not the spirit of the law.